CVE-2025-42918
BaseFortify
Publication date: 2025-09-09
Last updated on: 2025-10-23
Assigner: SAP SE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sap | sap_basis | 700 |
| sap | sap_basis | 701 |
| sap | sap_basis | 702 |
| sap | sap_basis | 731 |
| sap | sap_basis | 740 |
| sap | sap_basis | 750 |
| sap | sap_basis | 751 |
| sap | sap_basis | 752 |
| sap | sap_basis | 753 |
| sap | sap_basis | 754 |
| sap | sap_basis | 755 |
| sap | sap_basis | 756 |
| sap | sap_basis | 757 |
| sap | sap_basis | 758 |
| sap | sap_basis | 816 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in SAP NetWeaver Application Server for ABAP allows authenticated users who have access to background processing to gain unauthorized read access to profile parameters. Essentially, users with certain privileges can read sensitive configuration information they should not normally access.
How can this vulnerability impact me? :
The impact of this vulnerability is low on confidentiality because unauthorized users can read profile parameters, but it does not affect the integrity or availability of the system. This means sensitive information could be exposed, but the system's operation and data integrity remain intact.